2017
DOI: 10.1155/2017/4356038
|View full text |Cite
|
Sign up to set email alerts
|

Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography

Abstract: QR code (quick response code) is used due to its beneficial properties, especially in the mobile payment field. However, there exists an inevitable risk in the transaction process. It is not easily perceived that the attacker tampers with or replaces the QR code that contains merchant’s beneficiary account. Thus, it is of great urgency to conduct authentication of QR code. In this study, we propose a novel mechanism based on visual cryptography scheme (VCS) and aesthetic QR code, which contains three primary s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 30 publications
(15 citation statements)
references
References 14 publications
0
12
0
Order By: Relevance
“…Another method that is stated by (Lu, et al 2017) is by stacking the original QR Code with random shadow patterns or certain images which will then generate a new QR Code that has been encrypted. According to (Lu, et al 2017), this method itself has 3 stages in producing encrypted QR Code, which is to produce the first shadow, then continue to produce the second shadow, and the last is to combine the original QR Code with 2 shadows that have been previously generated. In producing both shadows, the author uses a secret pixel which is the breakdown of a pixel into 2 parts, namely black and white blocks.…”
Section: Related Workmentioning
confidence: 99%
“…Another method that is stated by (Lu, et al 2017) is by stacking the original QR Code with random shadow patterns or certain images which will then generate a new QR Code that has been encrypted. According to (Lu, et al 2017), this method itself has 3 stages in producing encrypted QR Code, which is to produce the first shadow, then continue to produce the second shadow, and the last is to combine the original QR Code with 2 shadows that have been previously generated. In producing both shadows, the author uses a secret pixel which is the breakdown of a pixel into 2 parts, namely black and white blocks.…”
Section: Related Workmentioning
confidence: 99%
“…The minimum distance of a Hamming code is 3, it implies that Hamming code can detect and correct single-bit error or detect double-bits errors. Take the most basic Hamming code (7,4)…”
Section: B Hamming Codementioning
confidence: 99%
“…This way, the minimum hamming distance of the Hamming code is increased form 3, in (7,4) Hamming code, to 4 in (8, 4) Hamming code. Therefore, the (8, 4) Hamming code has the ability to detect up to 3 errors.…”
Section: B Hamming Codementioning
confidence: 99%
See 1 more Smart Citation
“…Agostinho Marques Ximenes et al [5] tell about the implementation of QR code-based payment low-cost infrastructure in Indonesia with an added layer of Biometric security of transaction information. Jianfeng Lu et al [6] highlight one more risk in QR based payment. The attacker can tamper with or replace QR code which contains the merchant's bank account.…”
Section: Literature Surveymentioning
confidence: 99%